Key Management: - How Many Are There? - Who Creates Them? - Where Are They Stored? - Etc

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Key Management

Key Management

Key Management
cryptography is used in real systems
That means the keys exist in real systems
Some questions

Computer Security

Key Management

How many are there?


Who creates them?
Where are they stored?
etc

Key Management

Key Management

Key Management

How Many Keys Are There?

Well look at key management in a number


of parts of this course
For now a brief introduction will do

For basic symmetric cryptography there


need only be one
The shared secret key

For basic asymmetric cryptography there


needs to be four
Private and public key for each participant

Key Management

Key Management

Who Knows The Key

For asymmetric cryptography

For symmetric cryptography both


participants know the key

KAB

Each secret key is known only by its owner


The public keys are known by everybody

KPRIV-B
KPUB-A
KPUB-b

KPRIV-A
KPUB-A
KPUB-b

KAB

Key Management

Session keys vs. Long Term


Keys

Key Management

Session Key

The above assumes a minimal number of


keys
If one key is used too much and/or for too
long it is more vulnerable
So use more keys for less time each

Used for a session


Once the long term secret(s) is (are) used
for authentication a session key generated
Discarded once communication completed

Session keys
Replacement keys
7

Key Management

Key Management

Who Knows What Keys?

Who Knows What Keys?

For symmetric cryptography with session


key SKAB

For assymmetric cryptography with session


key SKAB
Note the session key is a symmetric key
KPRIV-A
KPUB-A
KPUB-B
SKAB

KAB
SKAB

KAB
SKAB

KPRIV-B
KPUB-B
KPUB-A
SKAB

10

Key Management

Key Management

Replacement Keys

Who Creates the Keys?

Once a key (either session or long term) has


been used for a while it may be wise to
replace it
Need to tell everyone who knows the key
what the new one is - securely

For a symmetric key (long term or session)


One participant?
Both?
A trusted third party?

For an asymmetric key pair


The owner?
A trusted third party?

11

12

Key Management

How are they Distributed

Key Management

Where are stored


the keys need to be protected
Have to store them in the users storage
space
How are they protected?
Often by passwords
Which are cryptographically much less
secure
Hmmm

For a session (or component) key it can be


distributed protected by a long term secret
For long term keys there is no other key to
protect their distribution in the system
Must be distributed off-line or by special
mechanism

13

Key Management

Summary
Remember who knows what keys and how
many
The difference between long term and
session key
Key distribution
Key protection
Well look at a lot of this in more detail as
we go through the course
15

14

You might also like